Presentation is loading. Please wait.

Presentation is loading. Please wait.

Institute for Cyber Security

Similar presentations


Presentation on theme: "Institute for Cyber Security"— Presentation transcript:

1 Institute for Cyber Security
On the Relationship between Finite Domain ABAM and PreUCONA Asma Alshehri and Ravi Sandhu Department of Computer Science 10th International Conference on Network and System Security (NSS) September 28-30, 2016 © Ravi Sandhu World-Leading Research with Real-World Impact!

2 World-Leading Research with Real-World Impact!
Outline Introduction ABAM model PreUCONA model Expressing PreUCONA IN ABAM Reducing ABAM to PreUCONA Right-Less ABAM with Two Parameters (RL-ABAM2) Expressing RL-ABAM2 in PreUCONA Conclusion Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

3 World-Leading Research with Real-World Impact!
Introduction ABAM: HRU + Attributes Test for and modify attribute values Set of attributes is finite PreUCONA Sub-model of UCON Test for and modify attribute values prior access Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

4 Attribute Based Access Matrix (ABAM)
Components: Subjects (S) and Objects (O) Attributes and Attribute Tuples Rights (R) and Access Matrix Attribute Predicates (P) Primitive Operations Commands Fig. 1. ABAM access matrix [14] ABAM access matrix [*] * Zhang, X., Li, Y., Nalla, D.: An attribute-based access matrix model. In: the 2005 ACM Symposium on Applied Computing, pp (2005). © Ravi Sandhu World-Leading Research with Real-World Impact!

5 Attribute Based Access Matrix (ABAM)
ABAM Commands: Parameters (entities with possibly new attribute values) Conditions A sequence of primitive operations. Command If then end Fig. 1. ABAM access matrix [14] ABAM access matrix [*] * Zhang, X., Li, Y., Nalla, D.: An attribute-based access matrix model. In: the 2005 ACM Symposium on Applied Computing, pp (2005). © Ravi Sandhu World-Leading Research with Real-World Impact!

6 World-Leading Research with Real-World Impact!
PreUCONA Three components: An object schema A set of finite usage rights A set of usage control commands Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

7 World-Leading Research with Real-World Impact!
PreUCONA PreUCONA Commands: Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

8 Expressing PreUCONA IN ABAM
Challenges: Condition Part in PreUCONA permits arbitrary computable Boolean functions Condition Part in ABAM only permits propositional logic formulas Finite domain results in: PreUCONA can be computed for all possible attribute values of s and o The results can be “compiled” into multiple ABAM commands. Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

9 Expressing PreUCONA IN ABAM
Example: Let the object schema and usage rights UR = {update}. The initial values for s and o attributes are [1,2,3] and [2,3,1] respectively for The PreUCONA update command is in the left side, and the table shows the possible ABAM commands: Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

10 Reducing ABAM to PreUCONA
Challenges of Reducing ABAM to PreUCONA PreUCONA command has the ability to grant a non-persistent right in each command ABAM command has the power of granting one or more rights to the actor, maintaining the given rights in the corresponding cell of the actor, and permitting two or more parameters (more targets) in each command. Unrestricted use of rights in ABAM will result in undecidable safety whereas PreUCONA has decidable safety Reducing ABAM to PreUCONA is not possible Right-Less ABAM with Two Parameters (RL-ABAM2) is a restricted form of ABAM that can be reduced to PreUCONA Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

11 Right-Less ABAM with Two Parameters (RL-ABAM2)
RL-ABAM2 command is limited in terms: Number of parameters The if statement section The existence of rights RL-ABAM2 command is is defined as follows: Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

12 Expressing RL-ABAM2 in PreUCONA
Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

13 Expressing RL-ABAM2 in PreUCONA
The corresponding PreUCONA components of the RL-ABAM2 schema are extended as follows: Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

14 Expressing RL-ABAM2 in PreUCONA
To apply a RL-ABAM2 command in PreUCONA commands, a sequence of steps is introduced as follows: 1- Give a lock to the first parameter of the RL-ABAM2 command 2- Decide the second parameter of the Rl-ABAM2 command Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

15 Expressing RL-ABAM2 in PreUCONA
3- Implement a sequence of PreUCONA commands (depend on the number of the operation over rights in the body of an RL-ABAM2 command) Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

16 Expressing RL-ABAM2 in PreUCONA
4- Release the lock from the first parameter (actor) of the RL-ABAM2 command. Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

17 World-Leading Research with Real-World Impact!
Conclusion The study of ABAM indicates that a safe application of access rights could be based on the following principles: 1- Do not use rights in the if part of commands 2- Some rights could be left behind by commands so their next use is more efficient 3- There is a meaningful place for access matrix rights Fig. 1. ABAM access matrix [14] © Ravi Sandhu World-Leading Research with Real-World Impact!

18 Institute for Cyber Security
Thank you!! Any Questions?? © Ravi Sandhu World-Leading Research with Real-World Impact!


Download ppt "Institute for Cyber Security"

Similar presentations


Ads by Google